]> git.proxmox.com Git - mirror_edk2.git/blame - OvmfPkg/Sec/Ia32/SecEntry.asm
OvmfPkg: Move SEC/PEI Temporary RAM from 0x70000 to 0x810000
[mirror_edk2.git] / OvmfPkg / Sec / Ia32 / SecEntry.asm
CommitLineData
49ba9447 1 TITLE SecEntry.asm\r
2;------------------------------------------------------------------------------\r
3;*\r
7cb6b0e0 4;* Copyright (c) 2006 - 2013, Intel Corporation. All rights reserved.<BR>\r
56d7640a 5;* This program and the accompanying materials\r
49ba9447 6;* are licensed and made available under the terms and conditions of the BSD License\r
7;* which accompanies this distribution. The full text of the license may be found at\r
8;* http://opensource.org/licenses/bsd-license.php\r
9;*\r
10;* THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
11;* WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
12;*\r
13;* CpuAsm.asm\r
14;*\r
15;* Abstract:\r
16;*\r
17;------------------------------------------------------------------------------\r
18\r
42a83e80 19#include <Base.h>\r
49ba9447 20\r
21 .686\r
22 .model flat,C\r
23 .code\r
24\r
25EXTERN SecCoreStartupWithStack:PROC\r
26\r
27;\r
0913fadc 28; SecCore Entry Point\r
49ba9447 29;\r
0913fadc 30; Processor is in flat protected mode\r
49ba9447 31;\r
0913fadc 32; @param[in] EAX Initial value of the EAX register (BIST: Built-in Self Test)\r
33; @param[in] DI 'BP': boot-strap processor, or 'AP': application processor\r
34; @param[in] EBP Pointer to the start of the Boot Firmware Volume\r
49ba9447 35;\r
0913fadc 36; @return None This routine does not return\r
49ba9447 37;\r
38_ModuleEntryPoint PROC PUBLIC\r
39\r
40 ;\r
7cb6b0e0 41 ; Load temporary RAM stack based on PCDs\r
49ba9447 42 ;\r
7cb6b0e0
JJ
43 SEC_TOP_OF_STACK EQU (FixedPcdGet32 (PcdOvmfSecPeiTempRamBase) + \\r
44 FixedPcdGet32 (PcdOvmfSecPeiTempRamSize))\r
45 mov eax, SEC_TOP_OF_STACK\r
49ba9447 46 mov esp, eax\r
47 nop\r
48\r
49 ;\r
7cb6b0e0
JJ
50 ; Setup parameters and call SecCoreStartupWithStack\r
51 ; [esp] return address for call\r
52 ; [esp+4] BootFirmwareVolumePtr\r
53 ; [esp+8] TopOfCurrentStack\r
49ba9447 54 ;\r
55 push eax\r
49ba9447 56 push ebp\r
57 call SecCoreStartupWithStack\r
58\r
59_ModuleEntryPoint ENDP\r
60\r
61END\r